1. Accelerating V2X Cryptography through Batch Operations;Bottinelli Paul;IACR Cryptol. ePrint Arch.,2019
2. David Cerdeira , Nuno Santos , Pedro Fonseca , and Sandro Pinto . 2020 . SoK: Understanding the Prevailing Security Vulnerabilities in TrustZone-assisted TEE Systems. In 2020 IEEE Symposium on Security and Privacy (SP). 1416–1432 . https://doi.org/10.1109/SP40000.2020.00061 10.1109/SP40000.2020.00061 David Cerdeira, Nuno Santos, Pedro Fonseca, and Sandro Pinto. 2020. SoK: Understanding the Prevailing Security Vulnerabilities in TrustZone-assisted TEE Systems. In 2020 IEEE Symposium on Security and Privacy (SP). 1416–1432. https://doi.org/10.1109/SP40000.2020.00061
3. Linux TPM2 & TSS2 Software Community. 2022. Linux TPM2 & TSS2 Software. https://github.com/tpm2-software/. Linux TPM2 & TSS2 Software Community. 2022. Linux TPM2 & TSS2 Software. https://github.com/tpm2-software/.
4. Evita Consortium. 2008. EVITA E-safety vehicle intrusion protected applications. https://evita-project.org. Evita Consortium. 2008. EVITA E-safety vehicle intrusion protected applications. https://evita-project.org.
5. Evita Consortium. 2011. Evita Deliverable D3.2: Secure On-board Architecture Specification. https://evita-project.org/Deliverables/EVITAD3.2.pdf. Evita Consortium. 2011. Evita Deliverable D3.2: Secure On-board Architecture Specification. https://evita-project.org/Deliverables/EVITAD3.2.pdf.